A Method of Traceable Data Security and Fidelity

A data security and data technology, applied in the field of communication security, can solve the problems of inability to restore data, inability to trace data traces, etc.

Active Publication Date: 2021-06-11
SHANGHAI TAIYU INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this method, the data track cannot be traced, and the data cannot be restored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Traceable Data Security and Fidelity
  • A Method of Traceable Data Security and Fidelity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] according to figure 1 As shown, a traceable data security system includes a data transfer party, a data receiver, and a data fidelity system; The guarantee method performs data exchange, thereby ensuring the completeness of the data.

Embodiment 2

[0053] Under the traceable data security fidelity method, the steps of transferring data Data from node A to node B:

[0054] 1. Data solidification processing at node A:

[0055] 1) The data Data is used as the input of the Hash function, and the output is the data verification code H t ;

[0056] 2) Combine the data Data with the check code H t Perform lossless compression together to form data n_Data;

[0057] 3) Encrypt data n_Data using Advanced Encryption Standard (AES) to form ciphertext data (n_Data) AES , the ciphertext data is used as hardened data.

[0058] 2. Data preservation processing at node A:

[0059] 1) The curing data (n_Data) AES Fusion with timestamp Timestamp to form data {(n_Data) AES +Timestamp};

[0060] 2) put data {(n_Data) AES +Timestamp} for compression mapping and generate check code H time ;

[0061] 3) will solidify the data (n_Data) AES , timestamp Timestamp and check code H time merge into data {(n_Data) AES +Timestamp+H tim...

Embodiment 3

[0075] The difference from the above-mentioned embodiment 2 is that under the method of traceable data security and fidelity, another method of data preservation is adopted in the process of transferring data Data from node A to node B;

[0076] The steps are:

[0077] 1) Put the data (n_Data) AES Perform compression mapping to generate check code H;

[0078] 2) will solidify the data (n_Data) AES Combine the sum check code H into data {(n_Data) AES +H} back up together, and back up two copies.

[0079] Also, in the data transfer step: from data{(n_Data) AES +H} to reload the data and retransmit to node B.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication security, in particular to a traceable data security fidelity method. Among them, the security strategy includes the security strategies in three aspects of the data fidelity stage, the data transmission stage and the data traceability stage; the strategy method of the data fidelity stage is to use the data fidelity system to perform data curing and data preservation on the data. Processing and recording data handover track information processing; the strategy method in the data transmission stage is that the user at the receiving end checks the data through the data fidelity system to determine the correctness of the data; the strategy method in the data traceability stage is that the user at the receiving end After discovering data errors, by querying the data transfer track information in the data fidelity system, the data reported with errors will be handed over and returned step by step according to the transfer track information. After each handover, the data will be re-verified at the upper-level node until the cause of the error is found .

Description

technical field [0001] The invention relates to the field of communication security, in particular to a traceable data security fidelity method. Background technique [0002] In the information age, office automation is becoming more and more popular. The traditional storage and transfer of documents in paper form can no longer meet people's needs. Digital document data gradually replaces paper files and becomes the new mainstream way of file storage and transfer. However, while the Internet is convenient for people to transfer and store data, it also brings people the risk of data loss. Malicious attackers can obtain data, tamper with data, or even destroy data through the network platform. If the security of computer storage data cannot be effectively guaranteed, it is very easy to cause personal or business economic property losses, as well as a series of problems such as privacy disclosure and confidential disclosure. Therefore, how to solve the security problems of da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
Inventor 陈继杰
Owner SHANGHAI TAIYU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products